After headline-grabbing hacking exploits against the likes of Sony Corp., the CIA, the U.S. Senate, and FBI partner Infragard, hacking group LulzSec said it won't stop its cyber exploits unless U.S. President Obama does one thing.

"If President Obama wears a shoe on his head throughout the entirety of his next big speech, we will cease fire on all targets forever," LulzSec said in its Twitter account on Saturday.

But apparently, LulzSec is calling it quits, according to a farewell letter it posted on Pastebin over the weekend.

"It's time to say bon voyage," the statement reads. "Our planned 50 day cruise has expired, and we must now sail into the distance, leaving behind -- we hope -- inspiration, fear, denial, happiness, approval, disapproval, mockery, embarrassment, thoughtfulness, jealousy, hate, even love. If anything, we hope we had a microscopic impact on someone, somewhere. Anywhere."

Lulz Security, however, encouraged people to continue Operation Anti-Security, a movement it resurrected with hacking group Anonymous. Anti-Sec encourages supporters to hack into, steal, and publish classified government information from any source while leaving the term "Antisec" as evidence of their intrusion.

"Again, behind the mask, behind the insanity and mayhem, we truly believe in the AntiSec movement... We hope, wish, even beg, that the movement manifests itself into a revolution that can continue on without us," LulzSec said.

Recent hacks by LulzSecurity have been focused on denial-of-service (DDoS), with web sites being paralyzed for a couple of hours. LulzSec has gained support from Internet sectors as their attacks inform victims of the vulnerability of their data online and, and, thus allow them to provide more firewalls and security before valuable information are obtained by others. LulzSec's signature is that it releases to the public e-mail accounts and passwords it has stolen -- prompting sites to suspend those accounts or users change their passwords, but at the same time allow others to mis-use or perform pranks if those accounts are not altered.

Here's a list of victims of LulzSec:

* May 7. Fox.com. Several passwords, LinkedIn profiles, and the names of 73,000 Simon Cowell's X-Factor contestants were leaked.

* May 10. Fox.com. Sales database and innerworkings of the studio were leaked.

* May 15. UK ATM database. Transaction logs of 3,100 automated teller machines in the United Kingdom were released.

* May 23. Sonymusic.co.jp. Sony Music's Japan website was hacked using SQL injection and meant to tell Sony that following the massive attacks against its PlayStation Network (which compromised thousands of credit card accounts), the company's security system remains weak.

* May 30. U.S. Public Broadcasting Service. Hack came after the broadcaster aired a documentary seen as critical of WikiLeaks founder Julian Assange. Aside from defacing the site, the hackers also posted an article -- rapper Tupac had been found alive and well in a small resort in New Zealand living with Biggie Smalls -- which fooled many.

* June 2. SonyPictures.com. Data stolen included personal information of 37,500 people, according to Sony Pictures Entertainment. But LulzSec claimed it compromised over 1,000,000 users' personal information, including passwords, email addresses, home addresses, dates of birth, and all Sony opt-in data associated with their accounts.

* June 3. InfraGard. The hackers leaked 180 accounts and passwords from the Atlanta chapter of InfraGard, an FBI partner organization.

* June 6. Sony BMG. The group released internal network maps of Sony BMG.

* June 8. Black & Berg Cybersecurity Consulting. LulzSec defaced the front page of the small network security company with the LulzSec logo. Black & Berg had challenged hackers to hack the site and alter the homepage graphic.

* June 9. British National Health Service. LulzSec did not release user details but only warned of the security vulnerability discovered in NHS systems.

* June 11. Pron.com. About 26,000 e-mail addresses and passwords from the porn web site were leaked.

* June 11-12. Bethesda Softworks. LulzSec declined to publish 200,000 Bink accounts at Bethesda, producer first-person shooter "Prey."

* June 13. United States Senate. LulzSec released the e-mails and passwords of a number of users of senate.gov. No highly sensitive information appears to have been hacked.

* June 14-15. Minecraft, League of Legends, The Escapist, S2 Games' Heroes of Newerth. The game sites were taken down at the request of fans. IT security company FinFisher was also taken down.

* June 15. CIA.gov. The United States Central Intelligence Agency's public website was taken offline for more than two hours with a denial-of-service attack.

* June 16. 62,000 "random logins", consisting of accounts and passwords from different e-mail service providers and sites were leaked by the site.

* June 18. Hackborums.net and Tribalwars.net. Sites were taken down by the hackers at the request their followers.

* June 20. Soca.gov.uk. As part of Anti-Sec, the web site of the Serious Organised Crime Agency, a national law enforcement agency of the United Kingdom, was taken offline.

* June 20. Infragard Connecticut. LulzSec compromised 1,000+ FBI-affiliated members.

* June 22. Brasil.gov.br and presidencia.gov.br. LulzSec's "Brazilian unit" took down two Brazilian government websites. They also brought down the website of Brazilian energy company Petrobra.

* June 23. Arizona Department of Public Safety. Along with contact information and user credentials, LulzSec released information includes training materials, email conversations and intelligence documents. LulzSec said the attack was carried out in large part as a statement against Arizona's controversial SB1070 immigration law.

* June 24. Peru. List of 2,800 police officers from the Peruvian Águilas Negras (Black Eagles Special Police Unit) and their personal information were leaked. The site was hacked together with Anonymous as part of Anti-Sec.

* June 25. E-mail addresses and passwords of private investigators. List provided by LulzSec at http://pastebin.com/BPBAcTxp

LulzSec's quick exit has baffled many. Aside from its tweets last Saturday indicating that the attacks would continue, one of the group's six members was allegedly interviewed by The Associated Press on Friday, and gave no indication that its cyber attacks were coming to an end.

This could be linked though to a hacker's arrest in Britain last week. Ryan Cleary was arrested in Britain last week though LulzSec denied that Cleary was a mastermind or a key member of the group. However, the timing of LulzSec's retirement suggests that Cleary may be forced to expose LulzSec to authorities.

There are concerns that LulzSec is just trying to "lie low", as the FBI and other authorities worldwide are on the heels of the publicity seeking hackers.

"Thank you for sailing with us. The breeze is fresh and the sun is setting, so now we head for the horizon," was LulzSec's last words, reminding us that unless and until they are caught, the group will always have the opportunity to strike again.